{"id":8240,"date":"2023-06-20T06:41:16","date_gmt":"2023-06-20T05:41:16","guid":{"rendered":"https:\/\/systemtm.com\/?page_id=8240"},"modified":"2023-06-20T06:51:58","modified_gmt":"2023-06-20T05:51:58","slug":"cybersicherheit","status":"publish","type":"page","link":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/","title":{"rendered":"Cybersicherheit"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;]<\/p>\n<h1 style=\"color: white;\">D\u00fcrr Group Cybersecurity<\/h1>\n<h1 style=\"color: white;\">Incident Management (D.C.I.M.)<\/h1>\n<p style=\"color: white; font-size: 20px;\">Das D\u00fcrr Group Cybersecurity Incident Management ist<\/p>\n<p style=\"color: white; font-size: 20px;\">f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3><strong>D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.)<\/strong><\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4>System TM A\/S ist Teil der HOMAG Gruppe und damit des D\u00fcrr-Konzerns. Das D\u00fcrr Group Cybersecurity Incident Management ist f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig.<\/h4>\n<p>F\u00fcr den D\u00fcrr-Konzern ist die Cybersecurity ein essenzieller Bestandteil einer stabilen, gut funktionierenden und erfolgreichen Produktion. Die Sicherheit der Daten, Produkte und Services, die wir unseren Kunden bereitstellen, steht f\u00fcr uns an h\u00f6chster Stelle. Das D\u00fcrr Group Cybersecurity Incident Management identifiziert und startet Ma\u00dfnahmen, um unsere Produkte und Services jeden Tag sicherer zu machen.[\/vc_column_text][vc_column_text]<strong>D\u00fcrr IT Service GmbH<\/strong><\/p>\n<p>Carl-Benz-Str. 34<br \/>\n74321 Bietigheim-Bissingen<br \/>\nDeutschland<\/p>\n<p><a href=\"mailto:cybersecurity@durr.com\">cybersecurity@durr.com<\/a>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h4><strong>Vulnerability Management<\/strong><\/h4>\n<p>Wo computerbasierte Systeme im Einsatz sind, kann es auch zu Schwachstellen (Vulnerabilities) kommen. Sollten Sie eine Sicherheitsl\u00fccke in einem unserer Produkte und Services identifizieren, dann k\u00f6nnen Sie uns \u00fcber das unten stehende Formular dar\u00fcber informieren. Wir k\u00fcmmern uns unverz\u00fcglich darum, die Sicherheitsl\u00fccke zu schlie\u00dfen. Das Melden der Schwachstelle wird nat\u00fcrlich streng vertraulich behandelt.[\/vc_column_text][vc_btn title=&#8221;Schwachstellen Meldeformular&#8221; style=&#8221;classic&#8221; color=&#8221;inverse&#8221; link=&#8221;url:https%3A%2F%2Fwww.durr-group.com%2Fde%2Fcybersecurity%3F_gl%3D1*7lr1pc*_gcl_au*MTA0MDg4NjY3OS4xNjg3MTcwNjYz%26_ga%3D2.16916985.1389363369.1687170663-1738947663.1687170663&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) Das D\u00fcrr Group Cybersecurity Incident Management ist f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text] System TM A\/S ist [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":1798,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-contact.php","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-8240","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>System TM Cybersicherheit<\/title>\n<meta name=\"description\" content=\"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"System TM Cybersicherheit\" \/>\n<meta property=\"og:description\" content=\"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"System TM A\/S\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/systemtm\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-20T05:51:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/systemtm.com\/wp-content\/uploads\/2017\/06\/Page_1203_John_Brash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/\",\"url\":\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/\",\"name\":\"System TM Cybersicherheit\",\"isPartOf\":{\"@id\":\"https:\/\/systemtm.com\/#website\"},\"datePublished\":\"2023-06-20T05:41:16+00:00\",\"dateModified\":\"2023-06-20T05:51:58+00:00\",\"description\":\"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.\",\"breadcrumb\":{\"@id\":\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/systemtm.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service\",\"item\":\"https:\/\/systemtm.com\/de\/service-2\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/systemtm.com\/#website\",\"url\":\"https:\/\/systemtm.com\/\",\"name\":\"System TM A\/S\",\"description\":\"Optimization of staff and wood resources\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/systemtm.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"System TM Cybersicherheit","description":"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/","og_locale":"en_US","og_type":"article","og_title":"System TM Cybersicherheit","og_description":"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.","og_url":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/","og_site_name":"System TM A\/S","article_publisher":"https:\/\/www.facebook.com\/systemtm\/","article_modified_time":"2023-06-20T05:51:58+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/systemtm.com\/wp-content\/uploads\/2017\/06\/Page_1203_John_Brash.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/","url":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/","name":"System TM Cybersicherheit","isPartOf":{"@id":"https:\/\/systemtm.com\/#website"},"datePublished":"2023-06-20T05:41:16+00:00","dateModified":"2023-06-20T05:51:58+00:00","description":"System TM A\/S ist Teil des D\u00fcrr-Konzerns, dessen Cybersecurity Incident Management f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig ist.","breadcrumb":{"@id":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/systemtm.com\/de\/service-2\/cybersicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/systemtm.com\/"},{"@type":"ListItem","position":2,"name":"Service","item":"https:\/\/systemtm.com\/de\/service-2\/"},{"@type":"ListItem","position":3,"name":"Cybersicherheit"}]},{"@type":"WebSite","@id":"https:\/\/systemtm.com\/#website","url":"https:\/\/systemtm.com\/","name":"System TM A\/S","description":"Optimization of staff and wood resources","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/systemtm.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Aislinn Esterle","author_link":"https:\/\/systemtm.com\/author\/aislinne\/"},"uagb_comment_info":0,"uagb_excerpt":"[vc_row full_width=&#8221;stretch_row_content&#8221; parallax=&#8221;content-moving-fade&#8221; parallax_image=&#8221;8231&#8243; css=&#8221;.vc_custom_1687177096143{padding-top: 100px !important;padding-bottom: 122px !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column css=&#8221;.vc_custom_1446035084676{background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column_text el_class=&#8221;container&#8221;] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) Das D\u00fcrr Group Cybersecurity Incident Management ist f\u00fcr die IT-Sicherheit des gesamten Konzerns zust\u00e4ndig. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text] D\u00fcrr Group Cybersecurity Incident Management (D.C.I.M.) [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text] System TM A\/S ist&hellip;","_links":{"self":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/comments?post=8240"}],"version-history":[{"count":6,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8240\/revisions"}],"predecessor-version":[{"id":8249,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/8240\/revisions\/8249"}],"up":[{"embeddable":true,"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/pages\/1798"}],"wp:attachment":[{"href":"https:\/\/systemtm.com\/wp-json\/wp\/v2\/media?parent=8240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}